Results 1 - 10
of
82
Benchmark Analysis
- of MCNP ENDF/B-VI Iron”, LA-12884, Los Alamos National Laboratory
, 1994
"... Wayfinders typically travel in dynamic environments where barriers and requirements change over time. In many cases, uncertainty exists about the future state of this changing environment. Current geographic information systems lack tools to assist wayfinders in understanding the travel possibilitie ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
possibilities and path selection options in these dynamic and uncertain settings. The goal of this research is a better understanding of the impact of dynamic and uncertain environments on wayfinding travel possibilities. An integrated spatio-temporal framework, populated with barriers and requirements, models
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
of her/his/their action. The consolidation of shared meaning through cr ystallization of practices in spatio-temporal con gurations creates cultures, that is systems of values and beliefs informing codes of behaviour. There is no systemic dominance in this matrix of relationships. There are all layers
QOS WITH RELIABILITY AND SCALABILITY IN ADAPTIVE SERVICE-BASED SYSTEMS
"... Service-based systems that are dynamically composed at runtime to provide complex, adaptive functionality are currently one of the main development paradigms in software engineering. However, the Quality of Service (QoS) delivered by these systems remains an important concern, and needs to be manage ..."
Abstract
- Add to MetaCart
that achieve their QoS requirements through dynamically adapting to changes in the system state, environment, and workload. QoSMOS service-based systems translate high-level QoS requirements specified by their administrators into probabilistic temporal logic formulae, which are then formally and automatically
Probabilistic verification at runtime for self-adaptive systems
- Institute for Software Technology (ISTE) University of Stuttgart
, 2013
"... Abstract. An effective design of effective and efficient self-adaptive systems may rely on several existing approaches. Software models and model checking techniques at run time represent one of them since they support automatic reasoning about such changes, detect harmful configurations, and poten ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
-time model checking represents a crucial research challenge. This paper precisely addresses this issue and focuses on probabilistic run-time model checking in which reliability models are given in terms of Discrete Time Markov Chains which are verified at run-time against a set of requirements expressed
Diagnosing the Weakest Link in WSN Testbeds: A Reliability and Cost Analysis
"... Abstract—This paper highlights and characterizes the main obstacle to deploying a robust wireless sensor network testbed: the USB connections that link each of the nodes via ethernet gateways to the central server. Unfortunately, these connections are also the components that, when properly installe ..."
Abstract
- Add to MetaCart
installed, can reduce testbed costs by attaching multiple nodes per gateway. After illustrating how unreliable current solutions can become (regardless of the used sensor nodes, USB cabling, or gateway setup), a set of experiments led to a list of dos and don’ts in testbed deployment. Furthermore, a simple
Automated Testing of Büchi Automata Translators for Linear Temporal Logic
, 2000
"... The formal verification of finite-state reactive and concurrent systems against temporal logical requirements can be done by model checking, which has the advantage of being well suited for automation. However, reasoning about the correctness of systems using automated techniques places high demands ..."
Abstract
- Add to MetaCart
The formal verification of finite-state reactive and concurrent systems against temporal logical requirements can be done by model checking, which has the advantage of being well suited for automation. However, reasoning about the correctness of systems using automated techniques places high
Performance Analysis of ARQ Protocols using a Theorem Prover
"... Automatic-repeat-request (ARQ) protocols are widely used in modern data communications to guarantee reliable transmission over imperfect physical links. The behavior of an ARQ protocol largely depends on a number of network parameters and traditionally simulation is used for their performance analys ..."
Abstract
-
Cited by 4 (3 self)
- Add to MetaCart
Automatic-repeat-request (ARQ) protocols are widely used in modern data communications to guarantee reliable transmission over imperfect physical links. The behavior of an ARQ protocol largely depends on a number of network parameters and traditionally simulation is used for their performance
3esis Supervisor Accepted by
, 2005
"... in partial ful2llment of the requirements for the degree of ..."
Lifting assertion and consistency checkers from single to multiple viewpoints
, 2002
"... Using a priority preorder on requirements or specifications, we lift established property-verification techniques of threevalued model checking from single to multiple viewpoints. This lift guarantees a maximal degree of autonomy and accountability to single views, automatically synthesizes single-a ..."
Abstract
-
Cited by 8 (3 self)
- Add to MetaCart
Using a priority preorder on requirements or specifications, we lift established property-verification techniques of threevalued model checking from single to multiple viewpoints. This lift guarantees a maximal degree of autonomy and accountability to single views, automatically synthesizes single-analysis
Formal Analysis of a Privacy-Preserving Billing Protocol
"... Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker for ..."
Abstract
- Add to MetaCart
Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker
Results 1 - 10
of
82